Security

Security Policy

Last updated: April 2026

🔒

Found a vulnerability? Email us directly at [email protected]. We aim to acknowledge all reports within 48 hours.

Our commitment

DataScreenIQ is committed to keeping our API and infrastructure secure. We appreciate the work of security researchers who help us identify and responsibly disclose vulnerabilities. This policy outlines how to report issues, what to expect from us, and what scope we consider in-bounds for research.

Reporting a vulnerability

Please report security vulnerabilities by emailing [email protected]. To help us triage and respond quickly, include:

Please do not open a public GitHub issue or social media post for security vulnerabilities. Responsible disclosure gives us the opportunity to fix the issue before it can be exploited.

What to expect from us

MilestoneTarget timeframe
Initial acknowledgementWithin 48 hours
Triage and severity assessmentWithin 5 business days
Fix for confirmed critical issuesWithin 14 days
Fix for confirmed high/medium issuesWithin 30 days
Public disclosure coordinationAgreed with reporter

We will keep you informed throughout the process and notify you when the issue is resolved. We will credit researchers who report valid vulnerabilities unless they prefer to remain anonymous.

In-scope

The following assets are in scope for security research:

Out of scope

The following are out of scope and should not be tested:

Safe harbour

We will not pursue legal action against researchers who discover and report vulnerabilities in good faith in accordance with this policy. We consider security research conducted under this policy to be authorised. We ask that you:

Our infrastructure

DataScreenIQ runs on Cloudflare Workers at the edge. Raw payload data is never stored — all screening happens in-memory. Only aggregated quality metrics (schema fingerprints, health scores, null rates) are persisted. Our authentication uses hashed API keys with a KV cache layer. Understanding our architecture may help you focus your research on the most meaningful attack surfaces.

Contact

For all security-related disclosures, email [email protected]. For general product enquiries, use [email protected]. This security policy is also published at /.well-known/security.txt.